Linux Security Testing Certification Training Course Overview

Learn how to eliminate or mitigate security issues on Unix based operating systems, file systems or applications that run on Unix and Linux. You'll get practical guidance and configuration support with real world examples, techniques and tricks to manage security. The Securing Linux training program outlines a highly technical approach using a number of tools and techniques in an enterprise environment with Linux setup. Utilize tools such as AIDE, lsof, sudo, SSH for handling security issues.

One of the main concerns in business environments nowadays is to secure systems from unscrupulous intentions that may damage the integrity and privacy of critical business information. The Securing Linux course from Koenig Solutions will help professionals safeguard their Linux/Unix systems from threats and vulnerabilities. Securing Linux and Unix systems course offers a complete guide on mitigating security risks by providing visibility of possible security loopholes and attack vectors. So join this course if you want your Linux/Unix system to be in your control.

Linux Security Testing (32 Hours) Download Course Contents

Live Online Training
Group Training 1950 Date On Request
1-on-1 Training (GTR) 2250
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Buy Flexi For Only $99 (Online Training Re-imagined)

Course Modules

Module 1: Memory Attacks and Overflows
  • Stack and Heap Overflows
  • Format String Attacks
  • Stack Protection
Module 2: Vulnerability Minimization
  • Minimization vs. Patching
  • OS Minimization
  • Patching Strategies
Module 3: Boot-Time Configuration
  • Reducing Services
  • systemd vs init
  • Email Configuration
  • Legacy Services
Module 4: Encrypted Access
  • Session Hijacking Exploits
  • The Argument For Encryption
  • SSH Configuration
Module 5: Host-Based Firewalls
  • IP Tables and Other Alternatives
  • Simple Single-Host Firewalls
  • Managing and Automating Rule Updates
Module 6: Rootkits and Malicious Software
  • Backdoors and Rootkits
  • Kernel Rootkits
  • chkrootkit and rkhunter
Module 7: File Integrity Assessment
  • Overview of AIDE
  • Basic Configuration
  • Typical Usage
Module 8: Physical Attacks and Defenses
  • Known Attacks
  • Single User Mode Security
  • Boot Loader Passwords
Module 9: User Access Controls
  • Password Threats and Defenses
  • User Access Controls
  • Environment Settings
Module 10: Root Access Control With Sudo
  • Features and Common Uses
  • Configuration
  • Known Issues and Work-Arounds
Module 11: Warning Banners
  • Why?
  • Suggested Content
  • Implementation Issues
Module 12: Kernel Tuning For Security
  • Network Tuning
  • System Resource Limits
  • Restricting Core Files
Module 13: Automating Tasks With SSH
  • Why and How
  • Public Key Authentication
  • ssh-agent and Agent Forwarding
Module 14: AIDE Via SSH
  • Conceptual Overview
  • SSH Configuration
  • Tools and Scripts
Module 15: Linux/Unix Logging Overview
  • Syslog Configuration
  • System Accounting
  • Process Accounting
  • Kernel-Level Auditing
Module 16: SSH Tunneling
  • X11 Forwarding
  • TCP Forwarding
  • Reverse Tunneling Issues
Module 17: Centralized Logging With Syslog-NG
  • Why You Care
  • Basic Configuration
  • Hints and Hacks for Tunneling Log Data
  • Log Analysis Tools and Strategies
Module 18: chroot() for Application Security
  • What is chroot()?
  • How Do You chroot()?
  • Known Security Issues
Module 19: The SCP-Only Shell
  • What It Is and How It Works
  • Configuring chroot() directory
  • Automounter Hacks for Large-Scale Deployments
Module 20: SELinux Basics
  • Overview of Functionality
  • Navigation and Command Interface
  • Troubleshooting Common Issues
Module 21: SELinux and the Reference Policy
  • Tools and Prerequisites
  • Creating and Loading an Initial Policy
  • Testing and Refining Your Policy
  • Deploying Policy Files
Module 22: BIND
  • Common Security Issues
  • Split-horizon DNS
  • Configuration for Security
  • Running BIND chroot()ed
Module 23: DNSSEC
  • Implementation Issues
  • Generating Keys and Signing Zones
  • Key "Rollover"
  • Automation Tools
Module 24: Apache
  • Secure Directory Configuration
  • Configuration/Installation Choices
  • User Authentication
  • SSL Setup
Module 25: Web Application Firewalls with mod_security
  • Introduction to Common Configurations
  • Dependencies and Prerequisites
  • Core Rules
  • Installation and Debugging
Module 26: Tools Throughout
  • The Sleuth Kit
  • Foremost
  • chkrootkit
  • lsof and Other Critical OS Commands
Module 27: Forensic Preparation and Best Practices
  • Basic Forensic Principles
  • Importance of Policy
  • Forensic Infrastructure
  • Building a Desktop Analysis Laboratory
Module 28: Incident Response and Evidence Acquisition
  • Incident Response Process
  • Vital Investigation Tools
  • Taking a Live System Snapshot
  • Creating Bit Images
Module 29: Media Analysis
  • File System Basics
  • MAC Times and Timeline Analysis
  • Recovering Deleted Files
  • Searching Unallocated Space
  • String Searches
Module 30: Incident Reporting
  • Critical Elements of a Report
  • Lessons Learned
  • Calculating Costs
Download Course Contents

Request More Information

Course Prerequisites
  • Before attending this course, students should have one year of experience managing Unix/Linux systems or have equivalent knowledge and skills
  • Good Understanding of TCP/IP is required

Upon Completion of this Course, you will accomplish following:-

  • Comprehend about Linux
  • Comprehend Network Attacks
  • Comprehend Logs and Integrity
  • Comprehend Securing Files and Directories
  • Comprehend Authorization Controls
  • Comprehend Firewall with IP table
  • Comprehend IDS and Honeypot
  • Comprehend Testing and Monitoring

Give an edge to your career with Cyber Security certification training courses. Students can join the classes for Linux Security Testing Training & Certification Course at Koenig Campus located at New Delhi, Bengaluru, Shimla, Goa, Dehradun, Dubai & Instructor-Led Online.